11-08-2022 01:16 AM - edited 11-08-2022 01:28 AM
Hi guys,
I'm using Change of Authorization (CoA) Re-authenticate Cisco:cisco-av-pair=subscriber:command=reauthenticate,
it works fine on pap and chap, but can't become online again on eap-md5, peap, ttls,tls.
The traffic capture file contain the sucessful process and the failed ones. In the failed process the coa is all successful but then the ISE rejects the switch.
And on the ise log page,
the first error shows
Event | 5440 Endpoint abandoned EAP session and started new |
Failure Reason | 5440 Endpoint abandoned EAP session and started new |
Resolution | Verify known NAD or supplicant issues and published bugs. Verify NAD and supplicant configuration. |
Root cause | Endpoint started new authentication while previous is still in progress. Most probable that supplicant on that endpoint stopped conducting the previous authentication and started the new one. Closing the previous authentication. |
Endpoint started new authentication while previous is still in progress.----------i don't how ISE know which is new and which is previous authentication.
And the second error shows
Event | 5400 Authentication failed |
Failure Reason | 11051 RADIUS packet contains invalid state attribute |
Resolution | Do the the following: Check the network device or AAA Client for hardware problems or known RADIUS compatibility issues ; Check the network that connects the device to ISE for hardware problems. |
Root cause | The state attribute in the RADIUS packet did not match any active session. |
About the known RADIUS compatibility issues, i'm using h3c switch actually, i don't know how this compatibility issues happens.
About the 11051 RADIUS packet contains invalid state attribute and The state attribute in the RADIUS packet did not match any active session. i have looked into the network traffic capture, i have to admin the state is not the same before and after the coa, but maybe it's because the ise sends the new state id to switch.
And i have tried in another environment with wireless device, the state attribute is also not the same before and after the coa, but successful, collected file in wireless sucessful coa reauth.zip
The other file and snapshots are collected on ise 2.4.0.357 patch 8, i have also tried on ise 3.1, the errors are the same.
So how should switch repond to make the process sucessful or what configuration i can do on ISE.
Thank you in advance!!
11-14-2022 12:44 PM - edited 11-14-2022 12:57 PM
Hi
Do you know why the CoA is being triggered? Is it because of ISE profiling?
Possibly, the H3C switch doesn't process the CoA re-auth as one might expect. Are you sure that this model of device support RADIUS CoA Re-auth? In my experience this form of CoA is very Cisco specific. Most vendors will support CoA packet of disconnect and very little else.
ISE does support other vednor devices and if possible, one should assign these non-Cisco devices with a Device Profile that matches the capabilities of the device. e.g. a HPE Switch has a profile in ISE, because it handles CoA and other things differently to a Cisco switch. I had a look at what the HPE switch supports, and it does not support Re-Auth. Interestingly, I see H3C Dictionary mentioned in the HPWired Network Device Profile. Perhaps these two vendors do things similarly.
H3c switch process CoA on port 3799 (which I see you're doing) - have you run a debug on the switch during and after the CoA, to see what the switch does ?
Have you also seen this great article by Thomas Howard?
11-24-2022 08:41 PM
Hi, thank you for your reply.
Do you know why the CoA is being triggered? Is it because of ISE profiling?
i manually trigger it in Live Sessions while capture the network traffic and logs. When profiling or posture trigger the coa, the results are the same.
have you run a debug on the switch during and after the CoA, to see what the switch does ?
the switch shows logs like Device DOT1X/7/EVENT: User failed to come online (UserMAC=000c-2944-2de5, VLANID=2, Interface=GigabitEthernet1/0/3). Reason: The RADIUS server rejected the authentication request。
I had a look at what the HPE switch supports, and it does not support Re-Auth
you mean in ise default Network Access Device Profiles, the hp wired do not has coa Re-authenticate enabled?
actually i replicate a Network Access Device Profile and input h3c-av-pair or cisco-av-pair equls subscriber:command=reauthenticate.
My confusion is why it works in pap or chap, but not working in eap.
thanks.
11-24-2022 10:30 PM
sounds like you have hit quite a specific roadblock. Perhaps it's time for a TAC case. I can't see why ISE would differentiate between a PAP/CHAP auth and an EAP auth with regards to sending a CoA.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide